Videos

Published on January 10th, 2011 📆 | 3905 Views ⚑

0

27c3: Analyzing a modern cryptographic RFID system (en)


Powered by iSpeech


Speakers: Henryk Plötz , Milosch Meriac

HID iClass demystified

Popular contactless systems for physical access control still rely on obscurity. As we have shown, time and time again, proprietary encryption systems are weak and easy to break. In a follow-up to last year's presentation we will now demonstrate attacks on systems with 'proper' cryptographic algorithms.

Since we broke the last of the big players on the market at 26C3, most vendors are now migrating to new systems which rectify our main point of concern: proprietary algorithms. All new technologies use AES or 3DES for encryption and/or authentication and vendors tirelessly tout the security of their systems and the use of these algorithms between card, reader and host. We will discuss the design of the successor to a system we attacked last year, and demonstrate how a system can be insecure despite the use of secure cryptoprimitives.





For more information visit:http://bit.ly/27c3_information

To download the video visit: http://bit.ly/27c3_videos


2011-01-10 05:10:54

source

Tagged with:



Comments are closed.